About the position
Responsibilities
• Utilize security tools to analyze, investigate, and triage security alerts
• Monitor our customers environments, including cloud and SaaS solutions for evidence of adversarial activity
• Perform in-depth analysis and investigation of high-priority cybersecurity incidents
• Utilize advanced tools, such as host based digital forensics or malware analysis capabilities, to identify incidents’ root causes, scope, and impact
• Collaborate with cyber threat hunting and cyber threat intelligence teams
• Participate in the development, implementation, and tuning of the SOC tools detection content and alerting signatures.
• Accurately document triage findings, and intake reports of external cybersecurity events from SOC customers via phone or email in the SOCs Incident Management System(IMS)
• Learn new open and closed-source investigative techniques
• Perform research into emerging threats and vulnerabilities to aid their prevention and mitigation
• Help shape the evolution of processes and procedures of the SOC
• Provide guidance and mentorship to Tier 1 SOC Analysts to enhance their skills and capabilities
Requirements
• Minimum of six (6) years of cybersecurity experience with at least three (3) years in a SOC watch floor analyst or IR role
• Bachelor’s Degree or higher in Cybersecurity or related is preferred
• CISSP or CEH certification; additional experience, formal training, certifications, and/or education may be substitutable at the client's discretion
• Experience in some of the following tools and technologies :i.e. SIEM experience required with Sumo Logic/Splunk preferred.
• Knowledge of common attacker tools, techniques and procedures (TTP)
• Experience with major cloud service provider offerings
• Knowledge of malware
• Knowledge of enterprise architecture including zero trust principles
• Knowledge of Windows and Unix operating systems
• Knowledge of common phishing techniques and how to investigate them
• Proficiency in technical writing
• Able to accurately and succinctly convey information through speaking, email, and presentations
• Comfortable in customer facing environments
• Ability to maintain a positive customer service mentality
• TS/SCI Clearance required
Nice-to-haves
• Previous SOC or incident response experience
• Working knowledge of regex and scripting languages
• Any SOC analyst relevant certifications such as those from GIAC or CompTIA
• The initiative to ask for assistance and offer fresh ideas to improve the SOC’s performance
Benefits
• Health/Dental/Vision
• 401(k) match
• Paid Time Off
• STD/LTD/Life Insurance
• Referral Bonuses
• professional development reimbursement
• parental leave
Apply Now
Apply Now